Must Read
Guardicore Discovers SSH Targeting Botnet: Telecom Infrastructure A Target (Along With Financial Systems)
via Ophir Harpaz, writing at the Guardicore Blog comes highly concerning news of a nascent SSH botnet discovery by the security professionals at Guardicore, dubbed FritzFrog. Today's Must Read! ...
Using Similar Taxonomies To Understand Present And Future Security Challenges
via Terena.org In what is certainly the single most fascinating and well-crafted piece on the taxonomy of organized crime in months; and it's present and future significance for information and cyber security ...
FCC Follies: The 20 Year Chinese Communist Monitoring Fail
via Jon Brodkin, plying the writing trade at our beloved Ars Technica, comes this tale of the Federal Communications Commission's latest fail of note. This time, with the Communist Chinese. Read the ...
Marc Tobias On Apple Inc.’s Siri Promises
View fullsize via Marc Weber Tobias, writing at Forbes, comes this superlative piece detailing consent inconsistency and other fundamental legal problems with Apple Inc.'s (NASDAQ: AAPL) Siri personal assistant. Todays Must Read ...
Knot’s Landed: Conway’s Knot Problem Solved
View fullsize via Quanta Magazine's Erica Klarreich, comes the story of Lisa Piccirillo's solution to Conway's Knot Problem. Behold, Ms. Piccirillo's proof. Today's MustRead. 'In the summer of 2018, at a conference ...
New APT Report: The Unknown Knowns
View fullsize Image Via via the erudite Catalin Cimpanu (formerly reporting at BleepingComputer, now writing at ZDNet's ZDNet's ZeroDay blog) comes well-crafted and detailed reporting, targeting the recent identification of APT group ...
Zooms’ Security Fails Common Knowledge To The Company’s ‘Partners’
View fullsize Begs the question as how effective the company's 'Business Partners' security programs were, as well. Today's Must Read via The New York Times journalists Natasha Singer and Nicole Perlroth ...
Villainy Of The Most Atrocious Sort
via Raphael Satter, Jack Stubbs and Christopher Bing, writing at Reuters comes this well-crafted reportage, detailing a new malicous attack on the World Health Organization and mounted by currently-surveilled foul-villains-of-the-cyber-kind. Most Assuredly ...
Douglas J. Leith, PhD: ‘Web Browser Privacy: What Do Browsers Say When The Phone Home?’
A new (published February 24th, 2020) study - targeting web browser chattiness and privacy (whatever may be left, i.e.). Comprised of highly detailed data, and authored by Professor Douglas J. Leith PhD, ...
POTS – Protective Optimization Technologies: May The Algorithm Be With You
via Adrian Colyer (a Venture Partner at London, UK ensconced Accel, and writing at The Morning Paper comes a sperlative analysis of this outstanding scholarly paper entitled POTS: Protective Optimization Technologies - ...